CyberCrows

CyberCrows

Cyber Security Skills | Tech Discussions | Tech Nerds Shop

30/10/2022

October is observed as Cyber Security Awareness Month worldwide; here are few tips for general awareness.

1. Always create secure passwords and don't share them, avoid common words and your personal information when creating

passwords.

2. Never give personal information and passwords/PINs over the phone or in e-mail. No bank or service provider will ever ask you for your passwords, PINS, OTPs etc. Mostly fraudsters ask for this information.

3. Where possible use two factor authentication and use the privacy settings to protect your information.

4. Never install any un-trusted app, game etc

on your mobile or computer.

5. Keep your anti-virus software, operating system and application up to date.

6. Don't click on unknown/suspicious links

in e-mails, popups and social media platforms. These are excellent way to get a virus and get hacked.

7. Avoid to visit unfamiliar websites and beware of look-a-like links.

8. Ensure tracking option is enabled on your mobile and laptop. Always erase your data and files while selling mobile devices or giving it away for repairs.

9. Most importantly; Where in doubt, take a small break, do some verification yourself or ask an expert.

Via : Unknown

07/10/2022

Do you know ?
Cyber crime is up by 600% since the beginning of the pandemic.

Stay Safe.
Stay Secure.

Learn more at :
www.cybercrows.com

26/09/2022

The LockBit operation has suffered a breach, with a disgruntled developer leaking the builder for the gang's newest encryptor. The latest version of the encryptor, version 3.0, was released by the gang in June. According to the gang, LockBit 3.0 has important novelties such as a bug bounty program, Zcash payment, and new extortion tactics. The gang has been active since at least 2019 and today it is one of the most active ransomware gangs. The code of the encryptor was leaked on Twitter by at least a couple of accounts, and . The builder is contained in a password-protected 7z archive, “LockBit3Builder.7z,” containing:

☑️ Build.bat;

☑️ builder.exe;

☑️ config.json;

☑️ keygen.exe.

Ali Qushji claims to have hacked the servers of the ransomware gang and stolen the ransomware encryptor. The availability of the builder could allow any malicious actor to create its own version of the ransomware customizing it by modifying the configuration file.

www.cybercrows.com

Photos from CyberCrows's post 19/09/2022

Interesting Facts in Cybersecurity.

18/09/2022

WORDPRESS SITES HACKEDY BY EXPLOITATTION OF CVE-2022-3180.
Hackers have actively exploited a zero-day flawn in the latest
version of a WordPress premium plugin known as WPGateway.

17/09/2022

We’re all going to have to change how we think about data protection.

Elizabeth Denham

Do you agree ?

16/09/2022

Do you agree ?

14/09/2022

Working in cybersecurity?
Need to look up an IP address or domain?

Here’s 15 IP address and domain search engines.

1. Whois https://lnkd.in/g9wzPfq3
2. IpAddress https://lnkd.in/g6GmxGcK
3. ARIN https://search.arin.net/
4. Censys https://search.censys.io/
5. Shodan https://www.shodan.io/
6. GreyNoise https://www.greynoise.io/
7. ZoomEye https://lnkd.in/gFnSPmBF
8. ONYPHYE https://www.onyphe.io/
9. BinaryEdge https://lnkd.in/gzma7EG6
10. AbuseIPDB https://www.abuseipdb.com/
11. VirusTotal https://lnkd.in/gQm7bWuM
12. URL Scan https://lnkd.in/gx6_kN8b
13. Abuse CH https://lnkd.in/gcif6Ujc
14. Intelligence X https://intelx.io/
15. What is My IP https://lnkd.in/g3TxK5rB

Enjoyed ? Don't forget to help others. 💪🤩

12/09/2022

What is SIEM ? How does it work.

stands for security, information, and event management. SIEM software collects and aggregates log data generated throughout the organization’s technology infrastructure, from host systems and applications to network and security devices such as firewalls and antivirus filters.

The software then identifies and categorizes incidents and events, as well as analyzes them. The software delivers on two main objectives, which are to provide reports on security-related incidents and events, such as successful and failed logins, malware activity and other possible malicious activities and send alerts if analysis shows that an activity runs against predetermined rulesets and thus indicates a potential security issue.

Learn more at www.cybercrows.com
Follow and stay tuned.

11/09/2022

Privacy Matters.

Follow CyberCrows for more useful content on Cyber Security.

------------------------------------------------

05/09/2022

Best Cyber Security and Hacking Documentary #1

1. We Are Legion – The Story Of The Hacktivists (https://lnkd.in/dEihGfAg)

2. The Internet’s Own Boy: The Story Of Aaron Swartz (https://lnkd.in/d3hQVxqp)

3. Hackers Wanted (https://lnkd.in/du-pMY2R)

4. Secret History Of Hacking (https://lnkd.in/dnCWU-hp)

5. Def Con: The Documentary (https://lnkd.in/dPE4jVVA)

6. Web Warriors (https://lnkd.in/dip22djp)

7. Risk (2016) (https://lnkd.in/dMgWT-TN)

8. Zero Days (2016) (https://lnkd.in/dq_gZA8z)

9. Guardians Of The New World (Hacking Documentary) | Real Stories (https://lnkd.in/dUPybtFd)

10. A Origem dos Hackers (https://lnkd.in/dUJgG-6J)

11. The Great Hack (https://lnkd.in/dp-MsrQJ)

12. The Networks Dilemma (https://lnkd.in/dB6rC2RD)

13. 21st Century Hackers (https://lnkd.in/dvdnZkg5)

14. Cyber War - Dot of Documentary (https://lnkd.in/dhNTBbbx)

15. CyberWar Threat - Inside Worlds Deadliest Cyberattack (https://lnkd.in/drmzKJDu)

16. The Future of Cyberwarfare (https://lnkd.in/dE6_rD5x)

17. Dark Web Fighting Cybercrime Full Hacking (https://lnkd.in/dByEzTE9)

18. Cyber Defense: Military Training for Cyber Warfare (https://lnkd.in/dhA8c52h)

19. Hacker Hunter: WannaCry The History Marcus Hutchin (https://lnkd.in/dnPcnvSv)

20. The Life Hacker Documentary (https://lnkd.in/djAqBhbw)

21. Hacker The Realm and Electron - Hacker Group (https://lnkd.in/dx_uyTuT)

Credit: Joas A Santos

Thank you for sharing such great content with the cybersecurity community!!!

04/09/2022

Dear Linkedin, here is how attackers are compromising LinkedIn accounts using stealer malware.

❗Step 1- A connection of yours would reach out, stating that there is a project that would be of interest for you from a random popular company.

❗Step 2- The connection, would share a URL - which is basically a zip file with more than 100MB. This would have the stealer malware.

❗Step 3- The job of the stealer malware is to steal your stored passwords or cookies on your browser. And then compromise your social accounts . The file size is kept at 100MB mostly to evade antivirus or security detection tools

❗Step 4- After compromising your computer the malware will use your account to further spread to other connections of yours.

❗❗❗ Please enable 2FA on your every account and avoid clicking on links from strangers.

----------------------------------------
✔ Follow CyberCrows for more amazing content and upgrade your cyber awarness.

----------------------------------------

04/09/2022

“Cyber-Security is much more than a matter of IT.” ― Stephane Nappo

------------------------------------

30/08/2022

Cybersecurity should be the top priority in companies.

Follow us for more.

---------------------------------------------------------------------------------------

29/08/2022

Top Cybersecurity Threats

Follow us for more.

---------------------------------------------------------------------------------------

24/08/2022

Do you know ?

Videos (show all)

Cybersecurity should be the top priority in companies.Follow us for more. ----------------------------------------------...
Top Cybersecurity Threats Follow us for more. --------------------------------------------------------------------------...